6 - Secure Coding Flashcards
Summarize secure application development, deployment, and automation concepts; analyze indicators of application attacks; be able to implement host or application security solutions
Adam is conducting software testing by reviewing the source code of the application. What type of code testing is Adam conducting?
Static Code Analysis
Charles is worried about his users conducting SQL-injection attacks. What solution would BEST address his concerns?
Regularly perform User Input Validation
Precompiled SQL statements that only require variables to be input are an example of what type of application security control?
Parameterized Queries
During a web application test, Ben discovers that the application shows SQL code as part of an error provided to application users. What should he note in his report?
“Improper Error Handling”
The application that Scott is writing has a flaw that occurs when two operations are attempted at the same time, resulting in unexpected results when the two actions do not occur in the expected order. What type of flaw does the app have?
A Race Condition
Every time Susan checks code into her org’s code repository, it is tested and validated, and (if accepted), it is IMMEDIATELY put into production. What is the BEST term for this sequence?
Continuous Delivery
Tim is working on a change to a web application used by his organization to fix a known bug. What environment should he be working in?
Development Environment
What software development model focuses on the early and continuous delivery of software?
Agile
Kevin would like to ensure that his software runs on a platform that is able to expand and contract as his org’s needs change. What term best describes his goal?
Elasticity
What are the advantages of database normalization?
Normalization prevents data inconsistencies, reduces the need for reconstruction, and makes the schema more informative
What data minimization technique replaces personal identifiers with unique identifiers that may be cross-referenced with a lookup table?
Tokenization
Frank is investigating a security incident where an attacker entered a very long string into an input field, which was followed by a system command. What type of attack likely took place?
Buffer Overflow
What type of attack places an attacker in the position to eavesdrop on communications between a user and a web server?
Man in the Middle (MitM)
Tom is a developer who creates code for sale to the public. He would like to assure his users that the code they receive actually came from him. What technique can he use to best provide this assurance?
Code Signing
What type of cross-site scripting attack would not be visible to a security professional inspecting the HTML source code in a browser?
DOM-Based XSS